Safe-mailTM ensures a secure transmission of information

Safe-mail is a web based e-mail system which provides all the user functionality of normal systems plus a whole lot more features to give absolute security, privacy and flexibility.
The Safe-mail web site resides on a mail server and all users communicate through any Internet browser directly to the mail server.

Each registered Safe-mail user has their own Virtual Secure User Space (VSUS) on the mail server. It contains a user's personal mailbox (in and out), personal information and personal electronic address book. Hence, communication between users is a function of messages going from one sector of the mail server to another sector of the same server. Unlike conventional e-mail systems, users do not need their own permanent computer to view and edit their address books or access their mail boxes. They simply need to access their VSUS via any Internet browser on any computer. Because all data held on the mail server is secured with a very strong proprietary encryption mechanism (as will be described below), a user's VSUS is a
very private and very secure place.

Safe-mail provides an unmatched level of protection against invasion of privacy when compared to any other system.
Using SSL (Secure Socket Layer which is a component of all current browsers) for all data transmissions and strong proprietary encryption for server security, Safe-mail offers the highest possible protection for all e-mail communications and file attachments. All e-mail including attachments transmitted to and from the mail server are secured with SSL.
For a detailed explanation of SSL and how it works go to How SSL works.


A second level of security is achieved by Safe-mailTM Authentication function


About Authentication

The authentication function allows you:

Creating Bona Fide Identity
You may authenticate another person because you know, absolutely, the true identity of the person being authenticated. (i.e. you are friends, colleagues, related etc.) With immediate effect, your name as the authenticator will appear on all the Safe-mailTM messages which your authenticated person sends. People receiving messages from that person bearing your name as an authenticator (and who know you) will immediately accept that the sender of the message is who they claim to be, even if they do not actually know the person sending the message. You may authenticate as many people as you wish. To authenticate another person, click on the Authentication tab in the top level of the Safe-mailTM interface, select the Send Authentication tab and key in their Safe-mailTM name in the To: field. Use the Comments box to define the significance of the authentication; this information will be displayed to the receiver of the authentication.

Closed-off Groups
The reasons for wanting to create a fenced-off community of people are numerous. In the business environment, a department may want to confine the exchange of information to within certain parts of the company, filtering out the trivial or non relevant. More casual groups of people with a common interest (hobbies etc.) may want to ensure that their incoming messages are from people who share the same interest. Whatever the reason, a closed group is where all the members are authenticated by one person and they only accept incoming Safe-mailTM from people who have been authenticated by that person. To control incoming Safe-mailTM by authentications, click on the Preferences tab in the top level of the Safe-mailTM interface and select Mail Control.

Restricted Access to Personal Information
You may wish to restrict the access of your person information to people who have been authenticated by a certain person whom you trust. To restrict access to your personal information, click on the User-info tab in the top level of the Safe-mailTM interface, go to the bottom of the page and complete the Publish List section.

Viewing and Removing Authentications
You may view the list of authentication certificates you have given and the list of authentication certificates you have received. Click on the Authentication tab in the top level of the Safe-mailTM interface and select either Authentications Received or Authentications Given.
While viewing the certificates, you may remove any cerificate you have given and any certificate you have received at any time by clicking the 'Remove' button at the top of the certificate.

For a better idea of how to use the Authentication feature, see example


©1999-2008 Safe-mail Limited. All rights reserved.
Safe-mailTM is a Trade Mark of Safe-mail Limited.